Описание
Windows Schannel Remote Code Execution Vulnerability
Missing release of memory after effective lifetime in Windows Cryptographic Services allows an unauthorized attacker to execute code over a network.
FAQ
According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to send a large number of messages.
How could an attacker exploit the vulnerability?
An attacker can exploit this vulnerability by sending malicious fragmented ClientHello messages to a target server that accepts Transport Layer Security (TLS) connections.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2022 | ||
Windows Server 2022 (Server Core installation) | ||
Windows 11 Version 22H2 for ARM64-based Systems | ||
Windows 11 Version 22H2 for x64-based Systems | ||
Windows 11 Version 23H2 for ARM64-based Systems | ||
Windows 11 Version 23H2 for x64-based Systems | ||
Windows Server 2022, 23H2 Edition (Server Core installation) | ||
Windows 11 Version 24H2 for ARM64-based Systems | ||
Windows 11 Version 24H2 for x64-based Systems | ||
Windows Server 2025 |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
DOS
EPSS
8.1 High
CVSS3
Связанные уязвимости
Missing release of memory after effective lifetime in Windows Cryptographic Services allows an unauthorized attacker to execute code over a network.
Missing release of memory after effective lifetime in Windows Cryptographic Services allows an unauthorized attacker to execute code over a network.
EPSS
8.1 High
CVSS3